Description
A vulnerability has been found in itsourcecode Online Doctor Appointment System 1.0. This impacts an unknown function of the file /admin/patient_action.php. Such manipulation of the argument patient_id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Published: 2026-03-12
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection
Action: Immediate Patch
AI Analysis

Impact

A vulnerability has been discovered in itsourcecode Online Doctor Appointment System 1.0 that allows an attacker to manipulate the patient_id parameter in the file /admin/patient_action.php, resulting in a classic SQL injection flaw. This flaw permits the execution of arbitrary SQL commands against the underlying database, potentially exposing sensitive patient records, modifying or deleting data, and undermining the integrity of the system. The weakness is identified as CWE‑74 (Improper Neutralization of Special Elements used in an SQL Command) and CWE‑89 (Improper Neutralization of Input During Database Query).

Affected Systems

Affected systems include the itsourcecode Online Doctor Appointment System version 1.0, which is distributed under the CPE cpe:2.3:a:unguardable:online_doctor_appointment_system:1.0. No other versions are explicitly documented as vulnerable, so users should verify whether newer releases contain the fix.

Risk and Exploitability

The severity rating of CVSS 6.9 indicates a medium to high impact, and an EPSS score of less than 1% suggests a low probability of exploitation at this time. The vulnerability is publicly disclosed and can be triggered remotely without authentication, so it presents a moderate to high risk when exposed to the internet. It is not listed in the CISA KEV catalog, but the combination of a remote attack vector, the sensitive data involved, and the lack of immediate mitigation make it important to address promptly.

Generated by OpenCVE AI on March 17, 2026 at 16:15 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check itsourcecode website or vendor communications for a patch or newer version that addresses the SQL injection flaw.
  • If no official patch is available, limit access to the /admin/patient_action.php endpoint to trusted IP addresses or through a VPN to reduce exposure.
  • Implement server‑side input validation or switch to prepared statements for the patient_id parameter to prevent SQL injection.

Generated by OpenCVE AI on March 17, 2026 at 16:15 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 16 Mar 2026 13:15:00 +0000

Type Values Removed Values Added
First Time appeared Unguardable
Unguardable online Doctor Appointment System
CPEs cpe:2.3:a:unguardable:online_doctor_appointment_system:1.0:*:*:*:*:*:*:*
Vendors & Products Unguardable
Unguardable online Doctor Appointment System

Fri, 13 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Sourcecodester
Sourcecodester doctor Appointment System
Vendors & Products Sourcecodester
Sourcecodester doctor Appointment System

Thu, 12 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 04:30:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in itsourcecode Online Doctor Appointment System 1.0. This impacts an unknown function of the file /admin/patient_action.php. Such manipulation of the argument patient_id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Title itsourcecode Online Doctor Appointment System patient_action.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Sourcecodester Doctor Appointment System
Unguardable Online Doctor Appointment System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-12T13:39:50.167Z

Reserved: 2026-03-11T14:28:29.319Z

Link: CVE-2026-3980

cve-icon Vulnrichment

Updated: 2026-03-12T13:39:45.409Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-12T05:16:13.610

Modified: 2026-03-16T13:05:52.577

Link: CVE-2026-3980

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:36:05Z

Weaknesses